Chapter 11. Advanced IoT Exploitation and Security Automation
In this chapter, we will cover the following recipes:
- Finding ROP gadgets
- Chaining web security vulnerabilities
- Configuring continuous integration testing for firmware
- Configuring continuous integration testing for web applications
- Configuring continuous integration testing for mobile applications